咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 网络空间安全
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 2 篇 nonrepudiation
  • 1 篇 proxy signcrypti...
  • 1 篇 digital signatur...
  • 1 篇 finite automaton
  • 1 篇 information secu...
  • 1 篇 electronic comme...
  • 1 篇 proxy signature

机构

  • 1 篇 dept. of compute...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 institute of net...

作者

  • 1 篇 张亦辰
  • 1 篇 李建中
  • 1 篇 李继国
  • 1 篇 xie xiao-yao 1 2...
  • 1 篇 曹珍富
  • 1 篇 2. institute of ...

语言

  • 2 篇 英文
检索条件"主题词=nonrepudiation"
2 条 记 录,以下是1-10 订阅
排序:
Accountability Analysis of Electronic Commerce Protocols by Finite Automaton Model
收藏 引用
Wuhan University Journal of Natural Sciences 2004年 第3期9卷 293-295页
作者: Xie Xiao-yao 1,2 , Zhang Huan-guo 1 1. School of Computer, Wuhan University, Wuhan 430072, Hubei, China 2. Institute of Network Technology, Guizhou University of Technology, Guiyang 550003, Guizhou, China School of Computer Wuhan University Wuhan Hubei China Institute of Network Technology Guizhou University of Technology Guiyang Guizhou China
The accountability of electronic commerce protocols is an important aspect to insures security of electronic transaction. This paper proposes to use Finite Automaton (FA) model as a new kind of framework to analyze th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Convertible Proxy Signcryption Scheme
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2004年 第2期11卷 209-213页
作者: 李继国 李建中 曹珍富 张亦辰 School of Computer and Information Engineering Hohai University Nanjing 210098 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China Dept. of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200030 China School of Computer and Information Engineering Hohai University Nanjing 210098 Chinan 1996 Mambo et al introduced the concept of proxy signature. However proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively which extended the concept of proxy signature. However only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes. To protect the receiver's benefit in case of a later dispute Wu and Hsu proposed a convertible authenticated encryption scheme which can enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim's scheme we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition the proposed scheme can be extended to convertible threshold proxy signcryption scheme.
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论